Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
b9c126e4b471862f23d75295af32b278_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9c126e4b471862f23d75295af32b278_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9c126e4b471862f23d75295af32b278_JaffaCakes118.html
-
Size
15KB
-
MD5
b9c126e4b471862f23d75295af32b278
-
SHA1
847171be629b990c1aa97c6fe8d8aa6242e8f0cc
-
SHA256
424abbe8af102091148378b7594a9a7ce220e7ebae2587825fe48d684471d427
-
SHA512
f5a2708020d3ae62523e304a74da86d1f9becae57046ed9c919ebda1b641e69e94b53861d0d5dc87359fd7c84ea19261d924ecb9c9dc06bf0d5d3392d0e29735
-
SSDEEP
192:+Bdh35jcCAthVSh5AqL7KoIS5WhYZwQJH26VXxIpYcQFEGcCtiX4a+5pz1tKalmX:+fzcrV4BdZ5NvPVXxCaEHCHpzp2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2232 msedge.exe 2232 msedge.exe 3480 msedge.exe 3480 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4360 3480 msedge.exe 84 PID 3480 wrote to memory of 4360 3480 msedge.exe 84 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 4604 3480 msedge.exe 85 PID 3480 wrote to memory of 2232 3480 msedge.exe 86 PID 3480 wrote to memory of 2232 3480 msedge.exe 86 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87 PID 3480 wrote to memory of 4016 3480 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b9c126e4b471862f23d75295af32b278_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4a5246f8,0x7ffd4a524708,0x7ffd4a5247182⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2324 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2132217531584336531,17709346413693520213,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5f002b3cb55f15c319e9b601f4c179684
SHA1f8bb4dbbbaaf6f960e85b83cea8df5ff7ff145c4
SHA25695c172e0c76cb8fb8e1bd0fb5ddc67aadbfd4b175b2c9403cff6b8b1d8721546
SHA512cf1ad7466fa3827f43261c9642ace0a4a1418be6d965ec1c7d6ad9b48dd826d9030383d14c250e2b09aed664294fa3f7016d7cf0ef757fe15a81276ec027a1de
-
Filesize
1KB
MD534ad7fa553b90c5fa2fa24b41053d9d9
SHA12b89eb7e442629e7ebb1e6b56ccd89fe3ba716e5
SHA256a40b2ecc6d681849240197b20c886560465f12871b8bfa24af94e44e743838c4
SHA512ed0426ac76a0df5a6a24690542df90806b94f43a02fd770cde48648cbf705d6e1a3138df031e79064e2e87bce53f4463b0e33a8b0df49bf27d9496b279d649fe
-
Filesize
5KB
MD55502505f3f70db1d75ac2a1bf4d66b8e
SHA1544f4ae0a575fae58840e0f69971df1a2058adb4
SHA25698aeac791ee2ae8aa07cd44eac3ee2cb22ad4d6300261f34ec72a2dc2e9a6669
SHA51230fe23258493c49c4c2aa1ac839ef0e4c31e89caed62bfa27d56cc56b2f33856a4c1fa9b60ae487cdd5841e366eca755a8884f887f82f6f3cc223e862affbe6a
-
Filesize
6KB
MD5c904e49cb466d8c0626d21cfc54f4ffd
SHA1d3c860149843c65827e6edd11640a3699e46c9ae
SHA256ccfced19d166d79fd25e6d7c37513dcada71829770560184a19fea4fc9171727
SHA5128cae6e8d839b03e7f11ed1a133a9cb374c84c3b0d10c5dab727bfaf2e9106825e966eaa35fde5e24fa8efec5f925b8d28771db2d6b5b8d3a1d5f9d00289111b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ce2752b9c303bc7a36d579eb663431a6
SHA146b4687c9c92cb5415fe1b88f3796a788929072c
SHA256746530f34e13c192ab6177ec04537e110f66ed47fcfab5cd488b271d4276fe31
SHA512a5738f3ed17e1156370eb66bf024392ea65e5c16ff3cef032a4532208f34954cdd928d33cb6aedd9a0319e9c7d891c138e286ef1bba4d1c21398b4ca5716ad17